Optimized Modelling and Evaluation of Wireless Sensor Networks for Intrusion Detection in Military Applications

Authors

  • Sabah Mohammed Fayadh Department of Computer Systems, Al Nassriyah Technical Institute, Southern Technical University, Thi-Qar, Iraq

DOI:

https://doi.org/10.29304/jqcsm.2024.16.41783

Keywords:

Wireless Sensor Networks, Intrusion Detection, Recurrent Convolutional Neural Network, Particle Swarm Optimization, Coral Reef Optimization, Military Surveillance, Security

Abstract

Wireless sensor networking is a promising technology with a wide range of applications, including health care and defense. The security of Wireless Sensor Networks (WSNs) is a major concern, particularly for applications where confidentiality is of the utmost importance, because, despite their attractive features (e.g., low installation cost, unattended network operation), these networks do not have a physical line of defense. So, to run WSNs securely, it's important to identify breaches before attackers damage the network or the data sink or base station, which are the nodes that collect and store information.  Enhancing the intrusion detection system was suggested in this study using a recurrent Convolutional Neural Network (RCNN) optimised using Particle Swarm Optimisation (PSO) and Coral Reef Optimisation (CRO). Successful intrusion detection has been achieved using the suggested method. When combined, PSO and CRO greatly enhance the efficacy and precision of threat identification. Everyone provides a novel and very effective method to resolve the vulnerabilities that endanger critical infrastructure and safeguard WSNs against them.

Downloads

Download data is not yet available.

References

I.F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, “A survey on sensor networks”, IEEE Communications Magazine, vol. 40, num. 8, pp. 102-114, 2002.

E. M. T. A. Alsaadi, S. M. Fayadh, and A. Alabaichi, “A review on security challenges and approaches in the cloud computing,” in AIP Conference Proceedings, 2020, vol. 2290, no. 1.

X. Chen, K. Makki, K. Yen and N. Pissinou, “Sensor network security: A survey”, IEEE Journal of Communications Surveys and Tutorials, vol. 11, num. 2, pp. 52-73, 2009.

Y. Zhou, Y. Fang and Y. Zhang, “Securing wireless sensor networks: a survey”, IEEE Journal of Communications Surveys and Tutorials, vol. 10, num. 3, pp. 6-28, 2008.

Ferng, H.W.; Khoa, N.M. On security of wireless sensor networks: A data authentication protocol usingdigitalsignature.Wirel. Netw.2017,23, 1113–1131. 7.Ismail, B.; In-Ho, R.; Ravi, S. An Intrusion Detection System Based on Multi-Level Clustering for HierarchicalWireless Sensor Networks.Sensors2015,15, 28960–28978.

Li, M.; Lou, W.; Ren, K. Data security and privacy in wireless body area networks.IEEEWirel. Commun.2016,17, 51–58.

Sun, Z.; Xu, Y.; Liang, G.; Zhou, Z. An Intrusion Detection Model for Wireless Sensor Networks with anImproved V-Detector Algorithm.IEEE Sens. J.2018,18, 1971–1984.

Tajbakhsh, A.; Rahmati, M.; Mirzaei, A. Intrusion detection using fuzzy association rules.Appl. Soft. Comput.2009,9, 462–469.

Xie, M.; Hu, J.; Guo, S.; Zomaya, A.Y. Distributed Segment-Based Anomaly Detection with Kullback–LeiblerDivergence in Wireless Sensor Networks.IEEE Trans. Inf. Forensic Secur.2017,12, 101–110.

Xie, M.; Hu, J.; Guo, S. Segment-based anomaly detection with approximated sample covariance matrix inwireless sensor networks.IEEE Trans. Parallel Distrib. Syst.2015,26, 574–583.

Haider, W.; Hu, J.; Slay, J.; Turnbull, B.P.; Xie, Y. Generating realistic intrusion detection system dataset basedon fuzzy qualitative modeling.J. Netw. Comput. Appl.2017,87, 185–192.

Ye, Y.; Li, T.; Adjeroh, D.; Iyengar, S.S. A survey on malware detection using data mining techniques.ACMComput. Surv.2017,50, 41.

Kumar, M.; Hanumanthappa, M. Intrusion detection system using stream data mining and drift detectionmethod.Res. Vet. Sci.2013,93, 168–171.

Khorshidpour, Z.; Hashemi, S.; Hamzeh, A. Evaluation of random forest classifier in security domain.Appl. Intell.2017,47, 558–569.

Lee, S.M.; Kim, D.S.; Park, J.S. A Hybrid Approach for Real-Time Network Intrusion Detection Systems.IEEE Trans. Veh. Technol.2011,60, 457–472.

Singh, K.; Guntuku, S.C.; Thakur, A.; Hota, C. Big Data Analytics framework for Peer-to-Peer Botnet detectionusing Random Forests.Inf. Sci.2014,278, 488–497.

Ronao, C.A.; Cho, S.B. Anomalous query access detection in RBAC-administered databases with randomforest and PCA.Inf. Sci.2016,369, 238–250.

Santos, M.S.; Abreu, P.H.; García-Laencina, P.J.; Simão, A.; Carvalho, A. A new cluster-based oversamplingmethod for improving survival prediction of hepatocellular carcinoma patients.J. Biomed. Inform.2015,58,49–59.

Fayadh, S.M., E.M.T.A. Alsaadi, and H. Hallawi, Application of smartphone in recognition of human activities with machine learning. Indonesian Journal of Electrical Engineering and Computer Science, 2023. 30(2): p. 860-869.

Downloads

Published

2024-12-30

How to Cite

Mohammed Fayadh, S. (2024). Optimized Modelling and Evaluation of Wireless Sensor Networks for Intrusion Detection in Military Applications. Journal of Al-Qadisiyah for Computer Science and Mathematics, 16(4), Comp. 201–214. https://doi.org/10.29304/jqcsm.2024.16.41783

Issue

Section

Computer Articles